SlideShare a Scribd company logo
1 of 43
Download to read offline
Wirtualizacja i
optymalizacja infrastruktury
Zbigniew Skurczyński
Dyrektor regionalny EE
F5 Networks
© F5 Networks
Application
Delivery
Network
Users Data Center
The Leader in Application Delivery Networking
SAP
Microsoft
Oracle
At Home
In the Office
On the Road
F5 ensures applications & Services running over the network are
always secure, fast and available
VoIP
CDN
Video
FTFP Radius
HTTP /HTML,
SIP, RTP, SRTP,
RTCP, SMTP,
FTP, SFTP,
RTSP, SQL,
CIFS, MAPI, IIOP,
SOAP, XML etc…
Customers
Partners
Suppliers
Consultants
© F5 Networks
Traditional Infrastructure Model
Corporate Employees
LAN & wLAN
Cloud Services Hosted Applications SAAS Apps and Data
in the Branch
Corporate
Data Center
Remote
Employees
Mobile
Employees
Branch Employees
LAN & wLAN
Customer, Partners,
or Suppliers
How do I connect all these applications
and services to the right people, at the
right moment in time, using the right
amount of resources, meet all my SLAs,
ensure security and save money?
© F5 Networks
What is Required to Fill the Gap
Dynamic Infrastructure Delivery Model
Corporate Employees Remote
Employees
Mobile
Employees
Branch Employees Customer, Partners,
or Suppliers
Cloud Services Hosted Applications SAAS Branch apps
and Data
Corporate
Data Center
Visibility
Integration
Context
Action
© F5 Networks
F5 Vision: Unified Application & Data Delivery
Context-Aware Networking
Corporate Employees
LAN & WLAN
Mobile
Employees
Customer, Partners, or
Suppliers
Branch Employees
LAN & WLAN
Remote
Employees
Cloud Services Hosted Applications Corporate
Data Center
SAAS Apps and Data
in the Branch
Enables the Dynamic Infrastructure
© F5 Networks
Consolidation by Virtualisation
EMC
PC - Home
App. Server
App. Server
Web Server
Web Server
Web Server
App. Server
App. Server
Web Server
Web Server
Web Server
PC - LAN
WLAN
Windows file
storage
Windows file
storage
NetApp
Cell
Remote - WAN
FileStorageVirtualization
ARX
ApplicationServerVirtualization
LTM
WebServerVirtualization
LTM
DataCenter&LinkVirtualization
GTM
& LC
© F5 Networks
Applications &
Storage
International
Data Center
F5’s ADN – Freeing IT, Optimizing Business
Enterprise Manager /
ControlPoint
TMOS
iControl
BIG-IP
Global
Traffic
Manager
iSession
FirePass
SSL VPN
BIG-IP Local
Traffic
Manager
BIG-IP
Application
Security
ManagerBIG-IP Web
Accelerator
BIG-IP Link
Controller
ARX
File/Data
Virtualization
Business Goal: Achieve these objectives in the most operationally efficient
manner
PC - Home
PC - LAN
WLAN
Cell
Remote -
WAN
© F5 Networks
Wirtualizacja ośrodków
obliczeniowych
© F5 Networks
High Cost of Downtime
“47% of the businesses cited that disaster recovery was a prime target for IT Spending”
– Network Computing Survivor’s Guide to 2006 survey
• 33% of businesses did not have Disaster
Recovery plans in place
• 16% of businesses lost between $100-$500K/
day
• 26% of businesses don’t know how much they
lost
Source: AT&T and IAEM report
© F5 Networks
Getting Users to the Best Available Data
Centre
Router
L-DNS
BIG-IP GTM
BIG-IP LTM
Corporate Servers
Site 1 (Primary)
Client
Router
BIG-IP LTM
Corporate Servers
Site 2 (Back up)
BIG-IP GTM
© F5 Networks
SOA Application Management
High availability
Persistence
Ease of maintenance
Delivering unique flexibility and intelligence to meet emerging
application challenges
Singapore
Data Centre
Sydney
Data Centre
© F5 Networks
Wirtualizacja wewnątrz ośrodków
obliczeniowych
© F5 Networks
Secure Access to Corporate Applications
Internet
Distributor Laptop
Mobile Device
Client PC
Specific
Application
Access
Portal
Access
Network
Access
Granular Access Policies
Authorized
Applications
Any User
Any Device
Kiosk
Intranet
SSL-VPN BENEFITS
• Browser based ubiquitous access
• Lower support & mgmt costs
• Granular access control
• Endpoint security
• Group Policy Enforcement
Microsoft
Exchange Server
Firewall
Kiosk Policy
Mini browser policy
Corporate Policy
Corporate Policy
FirePass®
-
+
-
+
End-Point SecureEnd-Point Secure
Access PolicyAccess Policy
ManagementManagement
© F5 Networks
The F5 Solution ApplicationsUsers
Mobile Phone
PDA
Laptop
Desktop
Co-location
Virtualization and optimization apps and services
CRM
Database
Siebel
BEA
Legacy
.NET
SAP
PeopleSoft
IBM
ERP
SFA
Custom
TMOS
Application Delivery Network
© F5 Networks
Application Security
Intelligent Decisions
Allow Only Good
Application Behaviour;
Positive Security
Definition of Good
and Bad BehaviourBrowser
© F5 Networks
F5 in the Enterprise Data Center
Web Client
Web Server
Web ClientWeb Client
Application Server Virtualization
Web ServerWeb Server
App. ServerApp. ServerApp. Server
Web Server Virtualization
© F5 Networks
F5 in the Service Provider Data Center
Web Applications
 WAP Proxy
 Hosted Acceleration
• Messaging
 SMS and MMS Scaling &
High Availability
Web Client
Web Server
Web ClientWeb Client
Application Server Virtualization
Web ServerWeb Server
App. ServerApp. ServerApp. Server
Web Server Virtualization
© F5 Networks
Service Provider Trends
• It’s all about the application!
– New revenue generating services
• Deploying multimedia services today
– Overlaid on legacy networks
– High OpEx to manage siloed applications
• IMS migration plans
© F5 Networks
Multiple networks
• High cost of deployment and operation
Service
Delivery
Platform
Media Functions
Subscriber Data
Application
Service
Delivery
Platform
Media Functions
Subscriber Data
Application
Service
Delivery
Platform
Media Functions
Subscriber Data
Application
Service 1 Service 2 Service N
IN nodes Billing PS domain CS domain OSS Pre-pay
© F5 Networks
Service 1 Service 2 Service N
Application Application Application
IN nodes Billing PS domain CS domain OSS Pre-pay
IP Multimedia Subsystem
What is IMS?
• Standardized framework for IP applications
Media Functions
Subscriber Data
© F5 Networks
F5 in the IMS Network
IMS Control Components
Session border controllers
Call/session controllers
Signaling Gateways
Multimedia Services
Streaming video servers
SIP application servers
IMS Ready ADC
IMS Client
IMS Component
IMS ClientIMS Client
Application Server Virtualization
IMS ComponentIMS Component
App. ServerApp. ServerApp. Server
IMS Component Virtualization
© F5 Networks
Service Provider Challenges
• Scale Applications
• Complexity and interoperability of
applications
• Scaling infrastructure
• Migrate and interoperate between legacy and
IMS components
© F5 Networks
Complex Applications
• Leader in mobile targeted advertising
• Problem:
– Require high availability
– Each carrier sends custom RTSP headers
– Each mobile device has different requirements
– Need solution that can be customized in the
field
© F5 Networks
Problem Solved
• Designed network with BIG-IP 3400
• Deployed for two major UK carriers
• Zero downtime
• iRules to customize per carrier and handset
© F5 Networks
F5 and had an iRule Fix in 3 hours
The power of SIP iRules
TMOS
Caller Anonymous functions (*67)
would crash core voice networking infrastructure
Benefits
• Dramatic Cost Reduction – Saved $1 Million USD
• Avoided 9 Month Delay – Implemented in 1 week
• Fixed application compatibility issues in the network
• Highly scaleable solution, deployed today
Equipment
Vendor
Service
Provider
© F5 Networks
TMOS – Universal Application
SwitchFull TCP
Proxy
TCP
Express
HTTP
CIFS
FTP
DNS
Specialized
Protocol Filters
Customizable
Parsing
iRules – Customized Functions
HTTP
HTTPS
TCP/IP
SCTP
RTSP
SIP
SMTP
SCTP
RTSP
SIP
• Only unified application
delivery controller
• Integrated, modular traffic
management
F5 provides the only
Unified Application Switch
to intelligently manage
any IP application.
© F5 Networks
Control
Applications
IMS Architecture
Web
Application
Messaging Voice Video
CSCF
SGW
MGCF
BGCF
I-SBC
HSS S-CSCF
DNS I-CSCF
P-CSCF
PSTN
Access
© F5 Networks
Integrated solution
• Comprehensive Load Balancing
• Advanced Application Switching
• Customized Health Monitoring
• Intelligent Network Address
Translation
• Advanced Routing
• Intelligent Port Mirroring
• IPv6 Gateway
• Universal Persistence
• Response Error Handling
• Session / Flow Switching
• DoS and SYN Flood Protection
• Network Address/Port Translation
• Application Attack Filtering
• Certificate Management
• SSL Acceleration
• Quality of Service
• Connection Pooling
• Intelligent Compression
• L7 Rate Shaping
• Content
Spooling/Buffering
• TCP Optimization
• Content Transformation
• Caching
• TCP Express
• Resource Cloaking
• Advanced Client Authentication
• Firewall - Packet Filtering
• Selective Content Encryption
• Cookie Encryption
• Content Protection
• Protocol Sanitization
• Network Virtualization
• System Resource Control
• Application Templates
• Dashboard
• Secure and Accelerated
DC to DC data flow
• DoS and DDos protection
• Brute Force attacks protection
© F5 Networks
Architected for Integration
iControl for Application Integration
F5 Products
TMOS
Operating System
Shared Application Services
Shared Network Services
Application
Optimization
Application
Security
Application
Availability
© F5 Networks
BIG-IP Hardware Line-up
Price
Function / Performance
BIG-IP 3600
Dual core CPU
8 10/100/1000 + 2x 1GB SFP
1x 160 GB HD + 8GB CF
4 GB memory
SSL @ 10K TPS / 2 Gb bulk
1 Gbps max software compression
2 Gbps Traffic
1 Advanced Product Module
BIG-IP 8900
BIG-IP 1600
Dual core CPU
4 10/100/1000 + 2x 1GB SFP
1x 160GB HD
4 GB memory
SSL @ 5K TPS / 1 Gb Bulk
1 Gbps max software compression
1 Gbps Traffic
1 Basic Product Module
2 x Dual core CPU
16 10/100/1000 + 8x 1GB SFP
2x 320 GB HD (S/W RAID) + 8GB CF
8 GB memory
SSL @ 25K TPS / 4 Gb bulk
5 Gbps max hardware compression
6 Gbps Traffic
Multiple Product Modules
BIG-IP 6900
2 x Quad core CPU
16 10/100/1000 + 8x 1GB SFP
2x 320 GB HD (S/W RAID) + 8GB CF
16 GB memory
SSL @ 58K TPS / 9.6Gb bulk
6 Gbps max hardware compression
12 Gbps Traffic
Multiple Product Modules
© F5 Networks
On-Demand & Dynamic Application Security
Leading Value
• World’s first on-demand scaling Web Application Firewall
• Advanced security
• Integrated security performance
• Application insight/visibility
BIG-IP Local Traffic
Manager + BIG-IP
Application Security
Manager
Better security  2x+ performance!
© F5 Networks
Ultimate Reliability
Client Server
Multi-Level Redundancy
• Blade failure will not cause chassis failure
• Redundant and hot swappable components
Always Available
© F5 Networks
Physical Server
Virtual
Machines
Physical Server
Virtual
Machines
Servers
Servers
Servers
On Demand – Zero Reconfiguration
• Automatic addition of power
• No need to overprovision
• Fixed and predictable opex
© F5 Networks
Wirtualizacja storage’u
© F5 Networks
IDC: Worldwide Network Controller and Block-Level Storage Virtualization 2008–2012
Forecast: A Key Component in Building the Virtual Datacenter, April 2008
Volume of Data Growing
Total Enterprise Disk Storage Systems
Exabytes Shipped(Exabytes)
IT is seeking cost and efficiency improvements
Why This Matters
IT Budget Constraints
© F5 Networks
The Key to Managing Storage Growth
User / application access tightly
coupled to physical file storage
– Inflexible: change is disruptive
– Complex: multiple mappings to
heterogeneous storage devices
– Inefficient: low aggregate utilization
BEFORE
 
© F5 Networks
The Key to Managing Storage Growth
User / application access tightly
coupled to physical file storage
– Inflexible: change is disruptive
– Complex: multiple mappings to
heterogeneous storage devices
– Inefficient: low aggregate utilization
File access decoupled from
physical storage location
– Flexible: change is non-disruptive
– Simple: single mapping to unified
storage pool
– Efficient: maximize utilization
BEFORE AFTER
 
© F5 Networks
What Does F5 ARX Do?
• Decouples access from physical file location
• Presents a Global Namespace view of the data – a
federation of the underlying file systems
• Masks changes to underlying storage systems from users
and applications
• Automates common storage management tasks
– Migration
– Storage Tiering
– Load Balancing
• These tasks now take place without affecting access to the
file data or requiring client re-configuration
© F5 Networks
F5 ARX®
Product Family
• Scalable product family
– ARX500: Departmental Device
– ARX1000: Mid Tier Device
– ARX4000: Mid to Large Enterprise
Device
– ARX6000: Data Center Device
• Enterprise-class management and
serviceability
– CLI, GUI, SNMP
– Logging, reporting, scripting
– Diagnostics, “e-mail home”
• Data Manager : Extensible software
platform
– File system inventory
– Configuration assistant
© F5 Networks
Podsumowanie
© F5 Networks
Munich
F5 in the Data Centre
Munich
Internet or WAN
App Servers
DMZ
ARX
BIG-IP LTM
WebAccelerator
FirePass
GTM / Link Controller
Users
Firewalls
File Storage
WOM
ARX
WOM
BIG-IP LTM / WA
FirePass
GTM/LC
Distributor
Supplier
Branch 1
Branch 2
Remote User
Home
User
VIPRION
VIPRION
© F5 Networks
Application
Delivery
Network
Users Data Center
The Leader in Application Delivery
Networking
SAP
Microsoft
Oracle
At Home
In the Office
On the Road
F5 ensures applications running over the network are always
secure, fast and available
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury

More Related Content

What's hot

F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks
 
BIG-IP Policy Enforcement Manager
BIG-IP Policy Enforcement ManagerBIG-IP Policy Enforcement Manager
BIG-IP Policy Enforcement ManagerF5 Networks
 
F5 Application Delivery Optimization
F5 Application Delivery OptimizationF5 Application Delivery Optimization
F5 Application Delivery OptimizationF5 Networks
 
F5 Value For Virtualization
F5 Value For VirtualizationF5 Value For Virtualization
F5 Value For VirtualizationPatricio Campos
 
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 TorontoF5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Torontopatmisasi
 
Top 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes SenseTop 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes SenseF5 Networks
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of ThingsPeter Silva
 
Cisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data CenterCisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data CenterF5NetworksAPJ
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5 Networks
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаBAKOTECH
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5 Networks
 
VIPRION 2400 and vCMP
VIPRION 2400 and vCMPVIPRION 2400 and vCMP
VIPRION 2400 and vCMPF5 Networks
 
F5 BIG-IP: Secure Application and Data Security Services
 F5 BIG-IP: Secure Application and Data Security Services F5 BIG-IP: Secure Application and Data Security Services
F5 BIG-IP: Secure Application and Data Security ServicesAmazon Web Services
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshowpatmisasi
 
Accelerating Application Delivery with Cisco and F5
Accelerating Application Delivery with Cisco and F5Accelerating Application Delivery with Cisco and F5
Accelerating Application Delivery with Cisco and F5Shashi Kiran
 
Services @ vfm
Services @ vfmServices @ vfm
Services @ vfmvfmindia
 
Cisco Intelligent WAN: Enabling the Next-Generation Branch
Cisco Intelligent WAN: Enabling the Next-Generation BranchCisco Intelligent WAN: Enabling the Next-Generation Branch
Cisco Intelligent WAN: Enabling the Next-Generation BranchCisco Canada
 

What's hot (20)

F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)
 
BIG-IP Policy Enforcement Manager
BIG-IP Policy Enforcement ManagerBIG-IP Policy Enforcement Manager
BIG-IP Policy Enforcement Manager
 
F5 Application Delivery Optimization
F5 Application Delivery OptimizationF5 Application Delivery Optimization
F5 Application Delivery Optimization
 
F5 Value For Virtualization
F5 Value For VirtualizationF5 Value For Virtualization
F5 Value For Virtualization
 
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 TorontoF5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
 
Top 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes SenseTop 10 Reasons Why F5 Makes Sense
Top 10 Reasons Why F5 Makes Sense
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
 
Cisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data CenterCisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data Center
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
 
Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV
 
F5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облакаF5 Networks - парадная дверь в облака
F5 Networks - парадная дверь в облака
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
 
VIPRION 2400 and vCMP
VIPRION 2400 and vCMPVIPRION 2400 and vCMP
VIPRION 2400 and vCMP
 
F5 BIG-IP: Secure Application and Data Security Services
 F5 BIG-IP: Secure Application and Data Security Services F5 BIG-IP: Secure Application and Data Security Services
F5 BIG-IP: Secure Application and Data Security Services
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshow
 
Accelerating Application Delivery with Cisco and F5
Accelerating Application Delivery with Cisco and F5Accelerating Application Delivery with Cisco and F5
Accelerating Application Delivery with Cisco and F5
 
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WANMoving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
 
Services @ vfm
Services @ vfmServices @ vfm
Services @ vfm
 
Cisco Intelligent WAN: Enabling the Next-Generation Branch
Cisco Intelligent WAN: Enabling the Next-Generation BranchCisco Intelligent WAN: Enabling the Next-Generation Branch
Cisco Intelligent WAN: Enabling the Next-Generation Branch
 

Similar to Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury

f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdfGrigoryShkolnik1
 
Customer Highleveloverview
Customer HighleveloverviewCustomer Highleveloverview
Customer Highleveloverviewrehanf5
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...solarisyourep
 
Level 3 Hybrid WAN/SDN Defined
Level 3 Hybrid WAN/SDN DefinedLevel 3 Hybrid WAN/SDN Defined
Level 3 Hybrid WAN/SDN DefinedScott Burns
 
Level 3 hybrid wan
Level 3 hybrid wan Level 3 hybrid wan
Level 3 hybrid wan Scott Burns
 
Level 3 hybrid wan
Level 3 hybrid wanLevel 3 hybrid wan
Level 3 hybrid wanScott Burns
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 Networks
 
F5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMGF5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMGDmitry Tikhovich
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...Cisco Canada
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overviewStef Coetzee
 
Earthlink introduction and its overview eb 01-16-04
Earthlink introduction and its overview   eb  01-16-04 Earthlink introduction and its overview   eb  01-16-04
Earthlink introduction and its overview eb 01-16-04 E B
 
Path to Network Functions Virtualization (NFV) Nirvana 2013
Path to Network Functions Virtualization (NFV) Nirvana 2013Path to Network Functions Virtualization (NFV) Nirvana 2013
Path to Network Functions Virtualization (NFV) Nirvana 2013Andrew Hendry
 
Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPatrickAng14
 

Similar to Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury (20)

f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
 
Customer Highleveloverview
Customer HighleveloverviewCustomer Highleveloverview
Customer Highleveloverview
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
 
Level 3 Hybrid WAN/SDN Defined
Level 3 Hybrid WAN/SDN DefinedLevel 3 Hybrid WAN/SDN Defined
Level 3 Hybrid WAN/SDN Defined
 
Level 3 hybrid wan
Level 3 hybrid wan Level 3 hybrid wan
Level 3 hybrid wan
 
Level 3 hybrid wan
Level 3 hybrid wanLevel 3 hybrid wan
Level 3 hybrid wan
 
F5 BigIP v9.ppt
F5 BigIP v9.pptF5 BigIP v9.ppt
F5 BigIP v9.ppt
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer Presentation
 
F5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMGF5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMG
 
Virtualization / Cloud / SDN
Virtualization / Cloud / SDNVirtualization / Cloud / SDN
Virtualization / Cloud / SDN
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overview
 
ICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOCICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOC
 
Earthlink introduction and its overview eb 01-16-04
Earthlink introduction and its overview   eb  01-16-04 Earthlink introduction and its overview   eb  01-16-04
Earthlink introduction and its overview eb 01-16-04
 
WEB SERVERS
WEB SERVERSWEB SERVERS
WEB SERVERS
 
Path to Network Functions Virtualization (NFV) Nirvana 2013
Path to Network Functions Virtualization (NFV) Nirvana 2013Path to Network Functions Virtualization (NFV) Nirvana 2013
Path to Network Functions Virtualization (NFV) Nirvana 2013
 
Palo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.pptPalo_Alto_Networks_Cust_June_2009.ppt
Palo_Alto_Networks_Cust_June_2009.ppt
 
IBM MQ v8 enhancements
IBM MQ v8 enhancementsIBM MQ v8 enhancements
IBM MQ v8 enhancements
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
An introduction and overview to Software as a Service
An introduction and overview to Software as a Service An introduction and overview to Software as a Service
An introduction and overview to Software as a Service
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury

  • 1. Wirtualizacja i optymalizacja infrastruktury Zbigniew Skurczyński Dyrektor regionalny EE F5 Networks
  • 2. © F5 Networks Application Delivery Network Users Data Center The Leader in Application Delivery Networking SAP Microsoft Oracle At Home In the Office On the Road F5 ensures applications & Services running over the network are always secure, fast and available VoIP CDN Video FTFP Radius HTTP /HTML, SIP, RTP, SRTP, RTCP, SMTP, FTP, SFTP, RTSP, SQL, CIFS, MAPI, IIOP, SOAP, XML etc… Customers Partners Suppliers Consultants
  • 3. © F5 Networks Traditional Infrastructure Model Corporate Employees LAN & wLAN Cloud Services Hosted Applications SAAS Apps and Data in the Branch Corporate Data Center Remote Employees Mobile Employees Branch Employees LAN & wLAN Customer, Partners, or Suppliers How do I connect all these applications and services to the right people, at the right moment in time, using the right amount of resources, meet all my SLAs, ensure security and save money?
  • 4. © F5 Networks What is Required to Fill the Gap Dynamic Infrastructure Delivery Model Corporate Employees Remote Employees Mobile Employees Branch Employees Customer, Partners, or Suppliers Cloud Services Hosted Applications SAAS Branch apps and Data Corporate Data Center Visibility Integration Context Action
  • 5. © F5 Networks F5 Vision: Unified Application & Data Delivery Context-Aware Networking Corporate Employees LAN & WLAN Mobile Employees Customer, Partners, or Suppliers Branch Employees LAN & WLAN Remote Employees Cloud Services Hosted Applications Corporate Data Center SAAS Apps and Data in the Branch Enables the Dynamic Infrastructure
  • 6. © F5 Networks Consolidation by Virtualisation EMC PC - Home App. Server App. Server Web Server Web Server Web Server App. Server App. Server Web Server Web Server Web Server PC - LAN WLAN Windows file storage Windows file storage NetApp Cell Remote - WAN FileStorageVirtualization ARX ApplicationServerVirtualization LTM WebServerVirtualization LTM DataCenter&LinkVirtualization GTM & LC
  • 7. © F5 Networks Applications & Storage International Data Center F5’s ADN – Freeing IT, Optimizing Business Enterprise Manager / ControlPoint TMOS iControl BIG-IP Global Traffic Manager iSession FirePass SSL VPN BIG-IP Local Traffic Manager BIG-IP Application Security ManagerBIG-IP Web Accelerator BIG-IP Link Controller ARX File/Data Virtualization Business Goal: Achieve these objectives in the most operationally efficient manner PC - Home PC - LAN WLAN Cell Remote - WAN
  • 8. © F5 Networks Wirtualizacja ośrodków obliczeniowych
  • 9. © F5 Networks High Cost of Downtime “47% of the businesses cited that disaster recovery was a prime target for IT Spending” – Network Computing Survivor’s Guide to 2006 survey • 33% of businesses did not have Disaster Recovery plans in place • 16% of businesses lost between $100-$500K/ day • 26% of businesses don’t know how much they lost Source: AT&T and IAEM report
  • 10. © F5 Networks Getting Users to the Best Available Data Centre Router L-DNS BIG-IP GTM BIG-IP LTM Corporate Servers Site 1 (Primary) Client Router BIG-IP LTM Corporate Servers Site 2 (Back up) BIG-IP GTM
  • 11. © F5 Networks SOA Application Management High availability Persistence Ease of maintenance Delivering unique flexibility and intelligence to meet emerging application challenges Singapore Data Centre Sydney Data Centre
  • 12. © F5 Networks Wirtualizacja wewnątrz ośrodków obliczeniowych
  • 13. © F5 Networks Secure Access to Corporate Applications Internet Distributor Laptop Mobile Device Client PC Specific Application Access Portal Access Network Access Granular Access Policies Authorized Applications Any User Any Device Kiosk Intranet SSL-VPN BENEFITS • Browser based ubiquitous access • Lower support & mgmt costs • Granular access control • Endpoint security • Group Policy Enforcement Microsoft Exchange Server Firewall Kiosk Policy Mini browser policy Corporate Policy Corporate Policy FirePass® - + - + End-Point SecureEnd-Point Secure Access PolicyAccess Policy ManagementManagement
  • 14. © F5 Networks The F5 Solution ApplicationsUsers Mobile Phone PDA Laptop Desktop Co-location Virtualization and optimization apps and services CRM Database Siebel BEA Legacy .NET SAP PeopleSoft IBM ERP SFA Custom TMOS Application Delivery Network
  • 15. © F5 Networks Application Security Intelligent Decisions Allow Only Good Application Behaviour; Positive Security Definition of Good and Bad BehaviourBrowser
  • 16. © F5 Networks F5 in the Enterprise Data Center Web Client Web Server Web ClientWeb Client Application Server Virtualization Web ServerWeb Server App. ServerApp. ServerApp. Server Web Server Virtualization
  • 17. © F5 Networks F5 in the Service Provider Data Center Web Applications  WAP Proxy  Hosted Acceleration • Messaging  SMS and MMS Scaling & High Availability Web Client Web Server Web ClientWeb Client Application Server Virtualization Web ServerWeb Server App. ServerApp. ServerApp. Server Web Server Virtualization
  • 18. © F5 Networks Service Provider Trends • It’s all about the application! – New revenue generating services • Deploying multimedia services today – Overlaid on legacy networks – High OpEx to manage siloed applications • IMS migration plans
  • 19. © F5 Networks Multiple networks • High cost of deployment and operation Service Delivery Platform Media Functions Subscriber Data Application Service Delivery Platform Media Functions Subscriber Data Application Service Delivery Platform Media Functions Subscriber Data Application Service 1 Service 2 Service N IN nodes Billing PS domain CS domain OSS Pre-pay
  • 20. © F5 Networks Service 1 Service 2 Service N Application Application Application IN nodes Billing PS domain CS domain OSS Pre-pay IP Multimedia Subsystem What is IMS? • Standardized framework for IP applications Media Functions Subscriber Data
  • 21. © F5 Networks F5 in the IMS Network IMS Control Components Session border controllers Call/session controllers Signaling Gateways Multimedia Services Streaming video servers SIP application servers IMS Ready ADC IMS Client IMS Component IMS ClientIMS Client Application Server Virtualization IMS ComponentIMS Component App. ServerApp. ServerApp. Server IMS Component Virtualization
  • 22. © F5 Networks Service Provider Challenges • Scale Applications • Complexity and interoperability of applications • Scaling infrastructure • Migrate and interoperate between legacy and IMS components
  • 23. © F5 Networks Complex Applications • Leader in mobile targeted advertising • Problem: – Require high availability – Each carrier sends custom RTSP headers – Each mobile device has different requirements – Need solution that can be customized in the field
  • 24. © F5 Networks Problem Solved • Designed network with BIG-IP 3400 • Deployed for two major UK carriers • Zero downtime • iRules to customize per carrier and handset
  • 25. © F5 Networks F5 and had an iRule Fix in 3 hours The power of SIP iRules TMOS Caller Anonymous functions (*67) would crash core voice networking infrastructure Benefits • Dramatic Cost Reduction – Saved $1 Million USD • Avoided 9 Month Delay – Implemented in 1 week • Fixed application compatibility issues in the network • Highly scaleable solution, deployed today Equipment Vendor Service Provider
  • 26. © F5 Networks TMOS – Universal Application SwitchFull TCP Proxy TCP Express HTTP CIFS FTP DNS Specialized Protocol Filters Customizable Parsing iRules – Customized Functions HTTP HTTPS TCP/IP SCTP RTSP SIP SMTP SCTP RTSP SIP • Only unified application delivery controller • Integrated, modular traffic management F5 provides the only Unified Application Switch to intelligently manage any IP application.
  • 27. © F5 Networks Control Applications IMS Architecture Web Application Messaging Voice Video CSCF SGW MGCF BGCF I-SBC HSS S-CSCF DNS I-CSCF P-CSCF PSTN Access
  • 28. © F5 Networks Integrated solution • Comprehensive Load Balancing • Advanced Application Switching • Customized Health Monitoring • Intelligent Network Address Translation • Advanced Routing • Intelligent Port Mirroring • IPv6 Gateway • Universal Persistence • Response Error Handling • Session / Flow Switching • DoS and SYN Flood Protection • Network Address/Port Translation • Application Attack Filtering • Certificate Management • SSL Acceleration • Quality of Service • Connection Pooling • Intelligent Compression • L7 Rate Shaping • Content Spooling/Buffering • TCP Optimization • Content Transformation • Caching • TCP Express • Resource Cloaking • Advanced Client Authentication • Firewall - Packet Filtering • Selective Content Encryption • Cookie Encryption • Content Protection • Protocol Sanitization • Network Virtualization • System Resource Control • Application Templates • Dashboard • Secure and Accelerated DC to DC data flow • DoS and DDos protection • Brute Force attacks protection
  • 29. © F5 Networks Architected for Integration iControl for Application Integration F5 Products TMOS Operating System Shared Application Services Shared Network Services Application Optimization Application Security Application Availability
  • 30. © F5 Networks BIG-IP Hardware Line-up Price Function / Performance BIG-IP 3600 Dual core CPU 8 10/100/1000 + 2x 1GB SFP 1x 160 GB HD + 8GB CF 4 GB memory SSL @ 10K TPS / 2 Gb bulk 1 Gbps max software compression 2 Gbps Traffic 1 Advanced Product Module BIG-IP 8900 BIG-IP 1600 Dual core CPU 4 10/100/1000 + 2x 1GB SFP 1x 160GB HD 4 GB memory SSL @ 5K TPS / 1 Gb Bulk 1 Gbps max software compression 1 Gbps Traffic 1 Basic Product Module 2 x Dual core CPU 16 10/100/1000 + 8x 1GB SFP 2x 320 GB HD (S/W RAID) + 8GB CF 8 GB memory SSL @ 25K TPS / 4 Gb bulk 5 Gbps max hardware compression 6 Gbps Traffic Multiple Product Modules BIG-IP 6900 2 x Quad core CPU 16 10/100/1000 + 8x 1GB SFP 2x 320 GB HD (S/W RAID) + 8GB CF 16 GB memory SSL @ 58K TPS / 9.6Gb bulk 6 Gbps max hardware compression 12 Gbps Traffic Multiple Product Modules
  • 31. © F5 Networks On-Demand & Dynamic Application Security Leading Value • World’s first on-demand scaling Web Application Firewall • Advanced security • Integrated security performance • Application insight/visibility BIG-IP Local Traffic Manager + BIG-IP Application Security Manager Better security  2x+ performance!
  • 32. © F5 Networks Ultimate Reliability Client Server Multi-Level Redundancy • Blade failure will not cause chassis failure • Redundant and hot swappable components Always Available
  • 33. © F5 Networks Physical Server Virtual Machines Physical Server Virtual Machines Servers Servers Servers On Demand – Zero Reconfiguration • Automatic addition of power • No need to overprovision • Fixed and predictable opex
  • 35. © F5 Networks IDC: Worldwide Network Controller and Block-Level Storage Virtualization 2008–2012 Forecast: A Key Component in Building the Virtual Datacenter, April 2008 Volume of Data Growing Total Enterprise Disk Storage Systems Exabytes Shipped(Exabytes) IT is seeking cost and efficiency improvements Why This Matters IT Budget Constraints
  • 36. © F5 Networks The Key to Managing Storage Growth User / application access tightly coupled to physical file storage – Inflexible: change is disruptive – Complex: multiple mappings to heterogeneous storage devices – Inefficient: low aggregate utilization BEFORE  
  • 37. © F5 Networks The Key to Managing Storage Growth User / application access tightly coupled to physical file storage – Inflexible: change is disruptive – Complex: multiple mappings to heterogeneous storage devices – Inefficient: low aggregate utilization File access decoupled from physical storage location – Flexible: change is non-disruptive – Simple: single mapping to unified storage pool – Efficient: maximize utilization BEFORE AFTER  
  • 38. © F5 Networks What Does F5 ARX Do? • Decouples access from physical file location • Presents a Global Namespace view of the data – a federation of the underlying file systems • Masks changes to underlying storage systems from users and applications • Automates common storage management tasks – Migration – Storage Tiering – Load Balancing • These tasks now take place without affecting access to the file data or requiring client re-configuration
  • 39. © F5 Networks F5 ARX® Product Family • Scalable product family – ARX500: Departmental Device – ARX1000: Mid Tier Device – ARX4000: Mid to Large Enterprise Device – ARX6000: Data Center Device • Enterprise-class management and serviceability – CLI, GUI, SNMP – Logging, reporting, scripting – Diagnostics, “e-mail home” • Data Manager : Extensible software platform – File system inventory – Configuration assistant
  • 41. © F5 Networks Munich F5 in the Data Centre Munich Internet or WAN App Servers DMZ ARX BIG-IP LTM WebAccelerator FirePass GTM / Link Controller Users Firewalls File Storage WOM ARX WOM BIG-IP LTM / WA FirePass GTM/LC Distributor Supplier Branch 1 Branch 2 Remote User Home User VIPRION VIPRION
  • 42. © F5 Networks Application Delivery Network Users Data Center The Leader in Application Delivery Networking SAP Microsoft Oracle At Home In the Office On the Road F5 ensures applications running over the network are always secure, fast and available